SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR PREVENTING COMMUNICATION OF UNWANTED NETWORK TRAFFIC BY HOLDING ONLY A LAST PORTION OF THE NETWORK TRAFFIC
First Claim
Patent Images
1. An intrusion protection system, comprising:
- a server, comprising;
a processor;
a network interface, coupled to the processor; and
a memory coupled to the processor, on which are stored instructions, comprising instructions that when executed cause the processor to;
receive via the network interface an initial portion of a file being transferred to a destination;
forward the initial portion of the file to the destination;
receive via the network interface a final portion of the file;
determine identifying information regarding the file;
query a file reputation database for a determination of whether the file is wanted or unwanted using the identifying information; and
refuse to forward the final portion of the file to the destination responsive to a determination that the file is unwanted.
7 Assignments
0 Petitions
Accused Products
Abstract
A system, method, and computer program product are provided for preventing communication of unwanted network traffic by holding only a last portion of the network traffic. In use, network traffic associated with a file transfer is received. Additionally, only a last portion of the network traffic associated with the file transfer is held for determining whether the file is unwanted. Further, the last portion of the network traffic associated with the file transfer is conditionally forwarded to a destination device, based on the determination.
-
Citations
20 Claims
-
1. An intrusion protection system, comprising:
a server, comprising; a processor; a network interface, coupled to the processor; and a memory coupled to the processor, on which are stored instructions, comprising instructions that when executed cause the processor to; receive via the network interface an initial portion of a file being transferred to a destination; forward the initial portion of the file to the destination; receive via the network interface a final portion of the file; determine identifying information regarding the file; query a file reputation database for a determination of whether the file is wanted or unwanted using the identifying information; and refuse to forward the final portion of the file to the destination responsive to a determination that the file is unwanted. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
8. A machine readable medium, on which are stored instructions that when executed cause a server to:
-
receive via a network interface an first portion of a file being transferred to a destination through the server; forward the first portion of the file to the destination; receive via the network interface a last portion of the file; determine identifying information regarding the file; determine whether the file is wanted or unwanted using the identifying information; and prevent forwarding of the last portion of the file to the destination responsive to a determination that the file is unwanted. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A method of preventing delivery of malware, comprising:
-
receiving by a server via a network interface an first portion of a file; forwarding by the server the first portion of the file to a destination for the file; receiving by the server via the network interface a second portion of the file; obtaining file identification information; determining whether the file contains malware using the file identification information; and preventing forwarding by the server of the second portion of the file to the destination responsive to a determination that the file contains malware. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification